Attack Patterns on Iot Devices Using Honey Net Cloud
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-2, December 2019 Attack Patterns on IoT devices using Honey Net Cloud A R Jayakrishnan, V.Vasanthi calculated to fingerprint the IoT malware, and such Abstract: Due to the superfluous growth of IoT devices in the fingerprints could be shared with the community over current digital world, where lots of devices are becoming smart by VirusTotal1. Static and dynamic analysis can be applied for being able to connect internet with many smart features, IoT the malwares those are not been fingerprinted to regulate devices have become the main target of cyber-attacks for the their malevolence [5]. hackers these days. Since the IoT devices are very light in terms of File-less attacks which is also called as non-malware processing power and memory, it has become an easy target for hackers to intrude in to the network easily. The file-less attacks, attacks or zero footprint attacks on IoT things vary from that usually doesn’t require any files to be downloaded and malware based attacks, where they need not download and installed gets bypassed by anti-malwares. Very less effort has been run malware files to infect the IoT devices; but instead they put to learn the characteristics of attack patterns in IoT devices to take benefit of existing vulnerabilities on the victims‟ devices do the research and development efforts to defend against them. and intrude in to the network. For the past few years, This paper deep dives to understand the attacks on IoT devices in progressively more and more file-less attacks were reported the network. HoneyNetCloud has been made with four hardware [6]. McAfee Labs reported that file-less attacks ramped up by honeypots and hundred software honeypots setup that are meant 430% by 2017 [7]. For the PCs, laptops and servers, to attract wide variety of attacks from the real world. Huge range defending file-less attacks can be easily done by using anti of data was recorded for the span of 12 months. This study leads to multifold insights towards developing the IoT Network Forensics malware tools, firewalls and antivirus apps [8]; however, Methodology. since due to the limited computing, storage and memory Keywords: IoT attack, Network Forensics, Honeypots, Digital capacity for the vast majority of IoT things, such antivirus Security, HoneyNetCloud, Intrusion. solutions are not suitable. As the result, file-less attacks stance substantial threats to the IoT ecosystem. Remember I. INTRODUCTION that the IoT things are often deployed in private and sensitive Internet of Things has rapidly enlarged popularity across environments, such as banks, military areas, government a wide range of areas in home automation, industrial smart offices, private residences and healthcare centres. There is sensing and control etc [2]. In general, most of today‟s IoT very limited visibility into their appearances and attack smart devices employs the Linux (eg. Raspbian and vectors at the moment, which hampers research and OpenWrt) for its programmability and prevalence [1]. development efforts to innovate new defence to battle Connected things however incessantly emit stream of data as file-less attacks [9] part of their communication in the network. Meanwhile, the A. Methodology cyber-attacks volume also increases rapidly. This paper therefore concentrates on Linux based IoT things and the In this research, I‟ve used honeypots, which are effective intrusions targeting them. In general, there are two types of to capture the unknown network attacks by attracting attacks on IoT things: File-less attacks and Malware based intruders to the network [10]. Initially, four hardware attacks [3]. honeypots were setup. Each of them was attached with a Malware based attacks are very common these days. remote control power adapter, which has the ability to reset Examples like PNScan, Mirai and Mayday have been broadly the honeypot when it is compromised to attacks. These acknowledged in IoT networks. Popular and commonly used indeed provided valuable insights in to the IoT attacks at the websites like Twitter, Github were inaccessible for many same time they are very expensive to setup too. In order to hours during Oct 2016, when their DNS provider attacked by attract more and more real-time attacks, I‟ve decided to scale Mirai under DDOS attack. This was infected over 1.2 million up the number of honeypots connected in a much cheaper and IoT things over the world [4]. Such alarming incidents effective way by installing virtual honeypots. Hundreds of created high alerts among investigators and researchers about software virtual honeypots were setup that are meant to malware based attacks on IoT systems; Their characteristics attract wide variety of attacks from the real world. With the have been extensively studied over past few years and hence ever growing cloud setup around the globe with various effective defence solutions were developed. For example, the providers, it seemed to be a possible solution for me in my hash MD5 or SHA-n of a malware‟s binary file can be approach as its both economical and practical to implement. However, there are a few practical concerns to this. Firstly, Revised Manuscript Received on December 05, 2019. the software honeypots should behave likewise to the actual * Correspondence Author IoT devices, so that it won‟t miss any sort of attacks. A. R Jayakrishnan*, Research Scholar, RCAS, Bharathiar University, Secondly, they should also be able to depict comprehensive Coimbatore, Tamilnadu. India V.Vasanthi, Assistant Professor, Dept of IT, SKASC, Coimbatore, data of the interaction methods, so that it will become easy to Tamilnadu, India categorize the difficult to track attacks. Finally, they have to go Published By: Retrieval Number: B6591129219/2019©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijitee.B6591.129219 3281 & Sciences Publication Attack Patterns on IoT devices using HoneyNetCloud along with the diverse policies imposed by the cloud attackers. It has been observed that 9231 attacks providers, so that limitations of clouds will not really impact executed commands like lscpu to extract very each other for the coverage of the study results. Hence, the sensitive information. This is derived from the design of the software honeypots was customized by measurements taken from the hardware honeypots incorporating the comprehensions composed from hardware setup as part of the implementation. Whereas in the honeypots, such as the encrypted command disclosure, kernel software honeypots HoneyNetCloud, an average of information masking and data flow symmetry monitoring. 6.9% fewer attacks were captured by the honeypot I‟ve carefully selected eight public clouds to disperse hosted on AWS than other public clouds. This could hundred software honeypots, and group of the developed be because AWS reveals IP range of all its VM system is called HoneyNetCloud. All of the software instances. Some of the malwares like Mirai will not honeypots in the HoneyNetCloud have been employed with infect specific IP range [12]. These comprehensions DD-WRT, which is the best and most popular Linux based were incorporated to improve the effectiveness and OpenSource firmware for IoT devices [11] and is also reliability of the design of HoneyNetCloud. appropriate for customization.In comparison with the . More file-less attacks due to the unique types of hardware honeypot, a virtual honeypot attracts 35% lesser attacks. Most difficult, powerful and dangerous suspicious connections and 37% lesser attacks on an average threats are observed to be file-less attacks. 41.2% of basis. However, the maintenance cost for the software the attacks are considered to be gathering system version is 12 times less compared to that of the hardware information and/or performing activities shutting honeypot. Interestingly, all the attacks trapped by the down firewalls, deactivating watchdog and stopping hardware honeypots have also been captured and trapped by antivirus services etc. This is considered to be done so the HoneyNetCloud, but this is not the other way round. This as to get clear way for consecutive attacks and also to proves the effectiveness of my design in practice. allow more targeted attacks. The pattern of attacks shows that the most favourite attack by hackers is B. Implications discovered from the findings file-less since they are difficult to fingerprint and Honeypots were run for a span of one year (i.e 02/Oct/2018 hence most suitable for cautious attack to 01/Oct/2019). The suspicious connections to the reconnaissance and preparations. In the attack honeypots were around 286 million in the time span of one metrics, there was also a targeted DDoS attack, that year. Out of which, 34 million (11.88%) successfully logged neither touches the filesystem nor run any shell and able to attack. The rest of 88.12% observed suspicious commands, however it manipulates a flock of IoT could not intrude to the honeypots, since they fail to crack the devices and make the attackers not visible to victims. passwords. Among the successful intrusion attaks, 2.5 The anomalous pattern of outbound network traffic is million were classified as file-less attacks and rest of them as the only indication of such attacks. It is highly malware attacks. promising for the existing host based tracking or . New security challenges by the file-less attacks monitoring system to catch it effectively. could be discovered and thus leads to propose new . Classification of eight types of attacks. The detailed defence directions. Most of the captured attacks were study of attack patterns and data captured for the using shell commands, hence they were all detectable duration of one year has provided the way to by auditing the command history in the IoT devices. categorise the IoT attacks in to eight different types. Most of the IoT devices use a readonly filesystem so Due to the lack of malware files and fingerprints, it that the malware based attacks could reduce, however was never an easy task to classify and also to identify this unpredictably increases the difficulty of detecting the attack patterns.